[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

Published: 01 March 2024 Publication History

Abstract

Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This article, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness property, which means the cloud service provider can get the reward from the mobile device if and only if it has returned a correct decryption result. Finally, we conduct an implementation to demonstrate that the proposed scheme is practical and efficient.

References

[1]
A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2005, pp. 457–473.
[2]
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Secur., 2006, pp. 89–98.
[3]
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Secur. Privacy, 2007, pp. 321–334.
[4]
B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” Lecture Notes Comput. Sci., vol. 2008, pp. 321–334, 2011.
[5]
M. Green et al., “Outsourcing the decryption of ABE ciphertexts,” in Proc. 20th USENIX Secur. Symp., 2011, Art. no.
[6]
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469–472, Jul. 1985.
[7]
J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 8, pp. 1343–1354, Aug. 2013.
[8]
J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, “Securely outsourcing attribute-based encryption with checkability,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 8, pp. 2201–2210, Aug. 2014.
[9]
B. Qin, R. H. Deng, S. Liu, and S. Ma, “Attribute-based encryption with efficient verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 7, pp. 1384–1393, Jul. 2015.
[10]
S. Lin, R. Zhang, H. Ma, and M. Wang, “Revisiting attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 10, pp. 2119–2130, Oct. 2015.
[11]
S. Yi, A. Andrzejak, and D. Kondo, “Monetary cost-aware checkpointing and migration on amazon cloud spot instances,” IEEE Trans. Serv. Comput., vol. 5, no. 4, pp. 512–524, Fourth Quarter 2012.
[12]
N. Kshetri, “Cloud computing in developing economies,” Computer, vol. 43, no. 10, pp. 47–55, Oct. 2010.
[13]
G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, vol. 151, pp. 1–32, 2014.
[14]
A. Akinyele, C. Lehmann, M. Green, M. Pagano, Z. Peterson, and A. Rubin, “Self-protecting electronic medical records using attribute-based encryption on mobile device,” Technical report. Cryptology ePrint Archive, Tech. Rep. 2010/565, 2010.
[15]
G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 735–737.
[16]
H. Ma, R. Zhang, Z. Wan, Y. Lu, and S. Lin, “Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing,” IEEE Trans. Dependable Secure Comput., vol. 14, no. 6, pp. 679–692, Nov./Dec. 2017.
[17]
H. Cui, Z. Wan, X. Wei, S. Nepal, and X. Yi, “Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain,” IEEE Trans. Inf. Forensics Secur., vol. 15, no. 1, pp. 3227–3238, Feb. 2020.
[18]
L. Luu, J. Teutsch, R. Kulkarni, and P. Saxena, “Demystifying incentives in the consensus computer,” in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 706–719.
[19]
R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers,” in Proc. Annu. Cryptol. Conf., Springer, 2010, pp. 465–482.
[20]
B. Parno, M. Raykova, and V. Vaikuntanathan, “How to delegate and verify in public: Verifiable computation from attribute-based encryption,” in Proc. Theory Cryptogr. Conf., Springer, 2012, pp. 422–439.
[21]
F. Monrose, P. Wyckoff, and A. D. Rubin, “Distributed execution with remote audit,” in Proc. Netw. Distrib. Syst. Secur. Symp., 1999, pp. 3–5.
[22]
A. Küpçü, “Incentivized outsourced computation resistant to malicious contractors,” IEEE Trans. Dependable Secure Comput., vol. 14, no. 6, pp. 633–649, Nov./Dec. 2017.
[23]
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza, “Snarks for C: Verifying program executions succinctly and in zero knowledge,” in Proc. Annu. Cryptol. Conf., Springer, 2013, pp. 90–108.
[24]
A. C. Yao, “Protocols for secure computations,” in Proc. IEEE 23rd Annu. Symp. Found. Comput. Sci., 1982, pp. 160–164.
[25]
C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169–178.
[26]
B. Dan and M. Franklin, “Identity-based encryption from the weil pairing,” in Proc. Int. Cryptol. Conf., 2001, pp. 213–229.
[27]
Beimel and Amos, Secure Schemes for Secret Sharing and Key Distribution, Technion-Israel Institute of Technology, Faculty of Computer Science, 1996.
[28]
B. Lynn et al., “PBC library,” 2006. [Online]. Available: http://crypto.stanford.edu/pbc
[29]
T. Wang, H. Ma, Y. Zhou, R. Zhang, and Z. Song, “Fully accountable data sharing for pay-as-you-go cloud scenes,” IEEE Trans. Dependable Secure Comput., vol. 18, no. 4, pp. 2005–2016, Jul./Aug. 2021.
[30]
S. C. Antonio and W. Zachary, “EIP-1108: Reduce alt_bn128 precompile gas costs,” 2018. [Online]. Available: https://eips.ethereum.org/EIPS/eip-1108

Cited By

View all
  • (2025)Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systemsComputer Standards & Interfaces10.1016/j.csi.2024.10388691:COnline publication date: 1-Jan-2025
  • (2024)An Authentication Scheme with Attribute-Based Encryption for Power Internet of ThingsProceedings of the 2024 3rd International Conference on Networks, Communications and Information Technology10.1145/3672121.3672152(161-165)Online publication date: 7-Jun-2024
  • (2024)Flexible and secure access control for EHR sharing based on blockchainJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2023.103033146:COnline publication date: 14-Mar-2024
  • Show More Cited By

Index Terms

  1. Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Dependable and Secure Computing
      IEEE Transactions on Dependable and Secure Computing  Volume 21, Issue 2
      March-April 2024
      500 pages

      Publisher

      IEEE Computer Society Press

      Washington, DC, United States

      Publication History

      Published: 01 March 2024

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systemsComputer Standards & Interfaces10.1016/j.csi.2024.10388691:COnline publication date: 1-Jan-2025
      • (2024)An Authentication Scheme with Attribute-Based Encryption for Power Internet of ThingsProceedings of the 2024 3rd International Conference on Networks, Communications and Information Technology10.1145/3672121.3672152(161-165)Online publication date: 7-Jun-2024
      • (2024)Flexible and secure access control for EHR sharing based on blockchainJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2023.103033146:COnline publication date: 14-Mar-2024
      • (2024)ORR-CP-ABEFuture Generation Computer Systems10.1016/j.future.2024.07.040161:C(559-571)Online publication date: 1-Dec-2024
      • (2024)KASE-AKAComputer Standards & Interfaces10.1016/j.csi.2024.10385290:COnline publication date: 1-Aug-2024
      • (2024)Revocable certificateless Provable Data Possession with identity privacy in cloud storageComputer Standards & Interfaces10.1016/j.csi.2024.10384890:COnline publication date: 1-Aug-2024
      • (2024)A new modified Skew Tent Map and its application in pseudo-random number generatorComputer Standards & Interfaces10.1016/j.csi.2023.10382689:COnline publication date: 25-Jun-2024

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media